Edit tour

Windows Analysis Report
https://ad.doubleclick.net/clk;265186560;90846275;t;pc=[TPAS_ID]?//greenhouseapparel.net/xxl/html/rd43rvmsnezgnnqraiqcwybrsjx3scsuc3rgxm0exjjg4yfysjdfep1yxoxlcdaqhkyc6ly1e0xfpf3v7e2l7pezacuqdlidi0hnfrrzclnogawbgrlqu8pmz1cptmn4bscjpstskgxsbs0gkrubvsqaebm7rj2ozbokfkasxpbsakspktnphfg68byfcpjsmu7elq

Overview

General Information

Sample URL:https://ad.doubleclick.net/clk;265186560;90846275;t;pc=[TPAS_ID]?//greenhouseapparel.net/xxl/html/rd43rvmsnezgnnqraiqcwybrsjx3scsuc3rgxm0exjjg4yfysjdfep1yxoxlcdaqhkyc6ly1e0xfpf3v7e2l7pezacuqdlidi0
Analysis ID:1381728

Detection

HtmlDropper, HTMLPhisher
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Html Dropper
Yara detected HtmlPhish10
Phishing site detected (based on image similarity)
Creates files inside the system directory
HTML body contains low number of good links
HTML page contains hidden URLs or javascript code
HTML title does not match URL
Invalid 'forgot password' link found
Invalid 'sign-in options' or 'sign-up' link found
Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 1344 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//greenhouseapparel.net/xxl/html/rd43rvmsnezgnnqraiqcwybrsjx3scsuc3rgxm0exjjg4yfysjdfep1yxoxlcdaqhkyc6ly1e0xfpf3v7e2l7pezacuqdlidi0hnfrrzclnogawbgrlqu8pmz1cptmn4bscjpstskgxsbs0gkrubvsqaebm7rj2ozbokfkasxpbsakspktnphfg68byfcpjsmu7elqs6/bmV1YmVydGpAYXVkaXRzLmdhLmdvdg== MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2540 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1940,i,2861782524517241642,11314834383174641573,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
4.7.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    4.8.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      5.10.pages.csvJoeSecurity_HtmlDropper_3Yara detected Html DropperJoe Security
        5.10.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          Phishing

          barindex
          Source: Yara matchFile source: 4.7.pages.csv, type: HTML
          Source: Yara matchFile source: 4.8.pages.csv, type: HTML
          Source: Yara matchFile source: 5.10.pages.csv, type: HTML
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313Matcher: Found strong image similarity, brand: MICROSOFT
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: Number of links: 0
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6e9b5cc1LOG21663221c08095a4839b4833d7029a6265b3c6e9b5cc2HTTP Parser: Number of links: 0
          Source: https://tw-office03auth-65protections.com/Mneubertj@audits.ga.govHTTP Parser: Base64 decoded: https://tw-office03auth-65protections.com/Mneubertj@audits.ga.gov
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: Title: fdde2b7913aa3a3f63b846a68504b9d565b3c6d8ec17c does not match URL
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6e9b5cc1LOG21663221c08095a4839b4833d7029a6265b3c6e9b5cc2HTTP Parser: Title: e950b5a3df2607e56c57675f1630bafd65b3c6e9b5c9b does not match URL
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: Invalid link: Fvovrvgvovtv vmvyv vpvavsvsvwvovrvd
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6e9b5cc1LOG21663221c08095a4839b4833d7029a6265b3c6e9b5cc2HTTP Parser: Invalid link: get a new Microsoft account
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: <input type="password" .../> found
          Source: https://tw-office03auth-65protections.com/Mneubertj@audits.ga.govHTTP Parser: No favicon
          Source: https://tw-office03auth-65protections.com/Mneubertj@audits.ga.govHTTP Parser: No favicon
          Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/zz7ke/0x4AAAAAAADnPIDROrmt1Wwj/light/normalHTTP Parser: No favicon
          Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/zz7ke/0x4AAAAAAADnPIDROrmt1Wwj/light/normalHTTP Parser: No favicon
          Source: https://tw-office03auth-65protections.com/Mneubertj@audits.ga.gov?__cf_chl_tk=mcIVQHGPzm3UQraMK7ZDKpNMZOX6bYFi9ghTOzWXQ1A-1706280652-0-gaNycGzNDbsHTTP Parser: No favicon
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: No favicon
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: No favicon
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: No favicon
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6e9b5cc1LOG21663221c08095a4839b4833d7029a6265b3c6e9b5cc2HTTP Parser: No favicon
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: No <meta name="author".. found
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: No <meta name="author".. found
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6e9b5cc1LOG21663221c08095a4839b4833d7029a6265b3c6e9b5cc2HTTP Parser: No <meta name="author".. found
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: No <meta name="copyright".. found
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313HTTP Parser: No <meta name="copyright".. found
          Source: https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6e9b5cc1LOG21663221c08095a4839b4833d7029a6265b3c6e9b5cc2HTTP Parser: No <meta name="copyright".. found
          Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49760 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49754 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49810 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49760 version: TLS 1.0
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownDNS traffic detected: queries for: ad.doubleclick.net
          Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
          Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
          Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
          Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
          Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
          Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
          Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
          Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
          Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
          Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
          Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
          Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
          Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
          Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
          Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
          Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
          Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49754 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49810 version: TLS 1.2
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_1344_1360258367
          Source: classification engineClassification label: mal60.phis.troj.win@23/79@32/171
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
          Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//greenhouseapparel.net/xxl/html/rd43rvmsnezgnnqraiqcwybrsjx3scsuc3rgxm0exjjg4yfysjdfep1yxoxlcdaqhkyc6ly1e0xfpf3v7e2l7pezacuqdlidi0hnfrrzclnogawbgrlqu8pmz1cptmn4bscjpstskgxsbs0gkrubvsqaebm7rj2ozbokfkasxpbsakspktnphfg68byfcpjsmu7elqs6/bmV1YmVydGpAYXVkaXRzLmdhLmdvdg==
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1940,i,2861782524517241642,11314834383174641573,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1940,i,2861782524517241642,11314834383174641573,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: Window RecorderWindow detected: More than 3 window changes detected

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 5.10.pages.csv, type: HTML
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          Registry Run Keys / Startup Folder
          1
          Process Injection
          11
          Masquerading
          OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Registry Run Keys / Startup Folder
          1
          Process Injection
          LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//greenhouseapparel.net/xxl/html/rd43rvmsnezgnnqraiqcwybrsjx3scsuc3rgxm0exjjg4yfysjdfep1yxoxlcdaqhkyc6ly1e0xfpf3v7e2l7pezacuqdlidi0hnfrrzclnogawbgrlqu8pmz1cptmn4bscjpstskgxsbs0gkrubvsqaebm7rj2ozbokfkasxpbsakspktnphfg68byfcpjsmu7elqs6/bmV1YmVydGpAYXVkaXRzLmdhLmdvdg==0%Avira URL Cloudsafe
          https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//greenhouseapparel.net/xxl/html/rd43rvmsnezgnnqraiqcwybrsjx3scsuc3rgxm0exjjg4yfysjdfep1yxoxlcdaqhkyc6ly1e0xfpf3v7e2l7pezacuqdlidi0hnfrrzclnogawbgrlqu8pmz1cptmn4bscjpstskgxsbs0gkrubvsqaebm7rj2ozbokfkasxpbsakspktnphfg68byfcpjsmu7elqs6/bmV1YmVydGpAYXVkaXRzLmdhLmdvdg==0%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          greenhouseapparel.net
          192.185.76.139
          truefalse
            unknown
            a.nel.cloudflare.com
            35.190.80.1
            truefalse
              high
              accounts.google.com
              64.233.185.84
              truefalse
                high
                plus.l.google.com
                142.250.105.139
                truefalse
                  high
                  ad.doubleclick.net
                  142.251.15.148
                  truefalse
                    high
                    challenges.cloudflare.com
                    104.17.2.184
                    truefalse
                      high
                      www.google.com
                      74.125.136.147
                      truefalse
                        high
                        clients.l.google.com
                        74.125.138.100
                        truefalse
                          high
                          unpkg.com
                          104.16.124.175
                          truefalse
                            high
                            tw-office03auth-65protections.com
                            172.67.169.228
                            truefalse
                              unknown
                              clients1.google.com
                              unknown
                              unknownfalse
                                high
                                clients2.google.com
                                unknown
                                unknownfalse
                                  high
                                  apis.google.com
                                  unknown
                                  unknownfalse
                                    high
                                    NameMaliciousAntivirus DetectionReputation
                                    https://tw-office03auth-65protections.com/Mneubertj@audits.ga.govfalse
                                      unknown
                                      https://tw-office03auth-65protections.com/Mneubertj@audits.ga.gov?__cf_chl_tk=mcIVQHGPzm3UQraMK7ZDKpNMZOX6bYFi9ghTOzWXQ1A-1706280652-0-gaNycGzNDbsfalse
                                        unknown
                                        https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6d8ec312PAS21663221c08095a4839b4833d7029a6265b3c6d8ec313true
                                          unknown
                                          https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6e9b5cc1LOG21663221c08095a4839b4833d7029a6265b3c6e9b5cc2false
                                            unknown
                                            https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/zz7ke/0x4AAAAAAADnPIDROrmt1Wwj/light/normalfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              1.1.1.1
                                              unknownAustralia
                                              13335CLOUDFLARENETUSfalse
                                              64.233.176.94
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.105.139
                                              plus.l.google.comUnited States
                                              15169GOOGLEUSfalse
                                              172.253.124.113
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              172.67.169.228
                                              tw-office03auth-65protections.comUnited States
                                              13335CLOUDFLARENETUSfalse
                                              104.17.3.184
                                              unknownUnited States
                                              13335CLOUDFLARENETUSfalse
                                              104.21.87.144
                                              unknownUnited States
                                              13335CLOUDFLARENETUSfalse
                                              239.255.255.250
                                              unknownReserved
                                              unknownunknownfalse
                                              104.16.124.175
                                              unpkg.comUnited States
                                              13335CLOUDFLARENETUSfalse
                                              64.233.185.84
                                              accounts.google.comUnited States
                                              15169GOOGLEUSfalse
                                              142.250.9.94
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              64.233.185.95
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              172.217.215.94
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              35.190.80.1
                                              a.nel.cloudflare.comUnited States
                                              15169GOOGLEUSfalse
                                              74.125.136.147
                                              www.google.comUnited States
                                              15169GOOGLEUSfalse
                                              192.185.76.139
                                              greenhouseapparel.netUnited States
                                              46606UNIFIEDLAYER-AS-1USfalse
                                              104.17.2.184
                                              challenges.cloudflare.comUnited States
                                              13335CLOUDFLARENETUSfalse
                                              142.251.15.148
                                              ad.doubleclick.netUnited States
                                              15169GOOGLEUSfalse
                                              74.125.138.100
                                              clients.l.google.comUnited States
                                              15169GOOGLEUSfalse
                                              IP
                                              192.168.2.17
                                              192.168.2.16
                                              Joe Sandbox version:39.0.0 Ruby
                                              Analysis ID:1381728
                                              Start date and time:2024-01-26 15:50:21 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                              Sample URL:https://ad.doubleclick.net/clk;265186560;90846275;t;pc=[TPAS_ID]?//greenhouseapparel.net/xxl/html/rd43rvmsnezgnnqraiqcwybrsjx3scsuc3rgxm0exjjg4yfysjdfep1yxoxlcdaqhkyc6ly1e0xfpf3v7e2l7pezacuqdlidi0hnfrrzclnogawbgrlqu8pmz1cptmn4bscjpstskgxsbs0gkrubvsqaebm7rj2ozbokfkasxpbsakspktnphfg68byfcpjsmu7elqs6/bmV1YmVydGpAYXVkaXRzLmdhLmdvdg==
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:7
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • EGA enabled
                                              Analysis Mode:stream
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal60.phis.troj.win@23/79@32/171
                                              • Exclude process from analysis (whitelisted): SIHClient.exe
                                              • Excluded IPs from analysis (whitelisted): 142.250.9.94, 34.104.35.123
                                              • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, clientservices.googleapis.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 26 13:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                              Category:dropped
                                              Size (bytes):2673
                                              Entropy (8bit):3.9875245004532567
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:2E61152FE6DF0B41B3232F69EE936397
                                              SHA1:68D8010DF1C33B19C0E65A525AF8BCB2203B65AF
                                              SHA-256:552D5D526B323D4DA4B1A91FCABC1DEA6EC37CE6B2E424F57151D0FA859B83C9
                                              SHA-512:9520A642D46E8E15D3B0A923116D7097E0D94A01BB85FCCB93EDFC83EF84623EC4E6191C154A49CB768A101B78C4BB969BFBB55B2248C0A599EC8FA18FBF9C99
                                              Malicious:false
                                              Reputation:low
                                              Preview:L..................F.@.. ...$+.,......[.gP..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I:XRv....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V:XYv....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V:XYv....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V:XYv..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V:XZv...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............YL.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 26 13:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                              Category:dropped
                                              Size (bytes):2675
                                              Entropy (8bit):4.003988634567248
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:9D0C1F780FD33ED7E3B1FEC7C18C2BE8
                                              SHA1:918161EF5D9E4A96118D6F45F4B9264D5040EAE1
                                              SHA-256:A64BC7ACC5144088C0E828C10ACAC74F1107224923FB6A35BAD6078B50AC7146
                                              SHA-512:EEEF9B84F248745994E38AD089B37586F09C18C6ED55307F30576C9DBF72CC973C1A759AA1B7B6EB8879CF3BABD7C12FFA00A8AF8F4012DDCB0648398635D919
                                              Malicious:false
                                              Reputation:low
                                              Preview:L..................F.@.. ...$+.,......M.gP..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I:XRv....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V:XYv....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V:XYv....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V:XYv..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V:XZv...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............YL.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                              Category:dropped
                                              Size (bytes):2689
                                              Entropy (8bit):4.00723338309506
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:9622C726EDD67E1DBE84BD3351382A12
                                              SHA1:264DF7EAE2111C7EAD9C390ECBE91D6A5F6C05A8
                                              SHA-256:B7453A449392AF32E6F045BB9B5332FF17166652EE3BE969ED02D105109BDB1D
                                              SHA-512:1CC53C5883F6A909A1A819F91EB9D37F85F69E16AFF3FA6A76F552E2E90FA000837A6AD46E14FF26B164F0007B23E0CFA9EF4ADE01A12BAC7189696CE59FCE8D
                                              Malicious:false
                                              Reputation:low
                                              Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I:XRv....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V:XYv....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V:XYv....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V:XYv..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............YL.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 26 13:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                              Category:dropped
                                              Size (bytes):2677
                                              Entropy (8bit):3.999482742459155
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:B8F3FAABEEF0265C292F48AC2E391ABF
                                              SHA1:81168B06D672A4092E83DDCC8D88711691DF6B6F
                                              SHA-256:CD9B3EBB73F3D23DF729E7018A730E76B16B0B24A84559FBEE5A3E7E9FEADDA4
                                              SHA-512:726807AA95082FF120E62B474D437BA2675E75411DC880813E42F0A2C85C098DB0E18E6062221C00DD08CBF7747E63CA8E50454B846F8165553373AFAB432CF6
                                              Malicious:false
                                              Reputation:low
                                              Preview:L..................F.@.. ...$+.,.....sH.gP..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I:XRv....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V:XYv....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V:XYv....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V:XYv..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V:XZv...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............YL.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 26 13:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                              Category:dropped
                                              Size (bytes):2677
                                              Entropy (8bit):3.9893631030795853
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:121320427B9FACA64E59E877ED1A3565
                                              SHA1:9CFC9CB83A6E962176F58E8BC4509363CBC252E5
                                              SHA-256:F03D74A4952FF2261684AE8C3AF5FD4466B6249B8F913C9E5FD2D45FAC78CA80
                                              SHA-512:BCFE23AB41975E7EC54DF445434FA2FAF404C0C49385B496A87C505B1DA09B0F5060076CCB50E0CB899FD785EC4B2259927406451F15892A01160885DC762209
                                              Malicious:false
                                              Reputation:low
                                              Preview:L..................F.@.. ...$+.,......V.gP..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I:XRv....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V:XYv....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V:XYv....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V:XYv..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V:XZv...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............YL.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 26 13:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                              Category:dropped
                                              Size (bytes):2679
                                              Entropy (8bit):3.9949185303629555
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:44C650653F012AB3D72BD6023BCAE0E7
                                              SHA1:92CBABDEAE2FA38BED9DD70C5508BF7B517BEC5A
                                              SHA-256:112472755180C1734F796B74141A25619890F9AFBD3E3E900FDBF963FB170A4D
                                              SHA-512:51397300A47D183913657A373884A8DC1FBAEB5DCAC8F3B9CCD8CB8EF6ABA39606F5049F7B8D940A633440389237294B4807C5987B1D46199380DF2DE4969A4E
                                              Malicious:false
                                              Reputation:low
                                              Preview:L..................F.@.. ...$+.,....e6@.gP..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I:XRv....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V:XYv....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V:XYv....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V:XYv..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V:XZv...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............YL.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (1573)
                                              Category:downloaded
                                              Size (bytes):163381
                                              Entropy (8bit):5.55207810705997
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:FA6D36C7AFEED16673724094493FD9C1
                                              SHA1:2F50ECA4CB4C99605E205742B30706DD02F2C96F
                                              SHA-256:7D63A081D9AAE9DF853F36E039219B13D84578119BF48F017CB3BB14366460BB
                                              SHA-512:3B2E2C85B307D092B5D5F852239A5E3AA60BA96BB38A4013F4768C8A36889204B8C1E333CA997A0DAA999B70133E34FCCD8A8C3927320073917F984649E0CAB7
                                              Malicious:false
                                              Reputation:low
                                              URL:"https://www.gstatic.com/og/_/js/k=og.qtm.en_US.RScl3bbyirc.2019.O/rt=j/m=q_dnp,qmd,qcwid,qapid,qald,q_dg/exm=qaaw,qabr,qadd,qaid,qalo,qebr,qein,qhaw,qhawgm3,qhba,qhbr,qhbrgm3,qhch,qhchgm3,qhga,qhid,qhidgm3,qhin,qhlo,qhlogm3,qhmn,qhpc,qhsf,qhsfgm3,qhtt/d=1/ed=1/rs=AA2YrTvLnSTmjOk117_e95V0EKaPsslVbQ"
                                              Preview:this.gbar_=this.gbar_||{};(function(_){var window=this;.try{._.Pj=function(a,b,c){return c?a|b:a&~b};_.Qj=function(a,b,c){a=_.fb(a,b,c);return Array.isArray(a)?a:_.ib};_.Rj=function(a,b,c){a=_.Pj(a,2,!!(2&b));a=_.Pj(a,32,!!(32&b)&&c);return a=_.Pj(a,2048,!1)};_.Sj=function(a,b,c){0===a&&(a=_.Rj(a,b,c));return a=_.Pj(a,1,!0)};_.Tj=function(a){return!!(2&a)&&!!(4&a)||!!(2048&a)};._.Uj=function(a,b,c,d,e,f){var g=!!(2&b),h=g?1:2;const k=1===h;h=2===h;e=!!e;f&&(f=!g);g=_.Qj(a,b,d);var l=g[_.u]|0;const p=!!(4&l);if(!p){l=_.Sj(l,b,e);var n=g,v=b;const r=!!(2&l);r&&(v=_.Pj(v,2,!0));let z=!r,E=!0,J=0,M=0;for(;J<n.length;J++){const aa=_.Qa(n[J],c,v);if(aa instanceof c){if(!r){const Lb=!!((aa.ka[_.u]|0)&2);z&&(z=!Lb);E&&(E=Lb)}n[M++]=aa}}M<J&&(n.length=M);l=_.Pj(l,4,!0);l=_.Pj(l,16,E);l=_.Pj(l,8,z);n[_.u]=l;r&&Object.freeze(n)}c=!!(8&l)||k&&!g.length;if(f&&!c){_.Tj(l)&&(g=_.wa(g),.l=_.Rj(l,b,e),b=_.eb(a,b,d,g));f=g;c=l;for(n=0;n<f.length;n++)l=f[n],v=_.db(l),l!==v&&(f[n]=v);c=_.Pj(c,8,!0);c=_.Pj
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (3572), with no line terminators
                                              Category:downloaded
                                              Size (bytes):3572
                                              Entropy (8bit):5.156042901425845
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:CECB5BDC975D1C3BB2411AB97D8CC0BD
                                              SHA1:DFE5C4BF7789418B9DD4DA28F6FB17DE0F8605D5
                                              SHA-256:45C00214F553272C9F37C242CBCF4CB8BA6EB4E6FCE84DB59C241DB85BFAD077
                                              SHA-512:5484E08118E8CC3F3E8678742631340027FE40DBBFEA3D091EB5DAC7653FCDCE808E7BA595C828E31ECD73E54F91D1F050C4143DC0A11DE475E3A7DB38EA5678
                                              Malicious:false
                                              Reputation:low
                                              URL:"https://www.gstatic.com/og/_/ss/k=og.qtm.p59jgm9SRCU.L.W.O/m=qmd,qcwid/excm=qaaw,qabr,qadd,qaid,qalo,qebr,qein,qhaw,qhawgm3,qhba,qhbr,qhbrgm3,qhch,qhchgm3,qhga,qhid,qhidgm3,qhin,qhlo,qhlogm3,qhmn,qhpc,qhsf,qhsfgm3,qhtt/d=1/ed=1/ct=zgms/rs=AA2YrTtRVVd7Ifu6yXdUSAZNCo3PPUxNcQ"
                                              Preview:.gb_1e{background:rgba(60,64,67,.9);-webkit-border-radius:4px;border-radius:4px;color:#fff;font:500 12px "Roboto",arial,sans-serif;letter-spacing:.8px;line-height:16px;margin-top:4px;min-height:14px;padding:4px 8px;position:absolute;z-index:1000;-webkit-font-smoothing:antialiased}.gb_Cc{text-align:left}.gb_Cc>*{color:#bdc1c6;line-height:16px}.gb_Cc div:first-child{color:white}.gb_ma{background:none;border:1px solid transparent;-webkit-border-radius:50%;border-radius:50%;-webkit-box-sizing:border-box;box-sizing:border-box;cursor:pointer;height:40px;margin:8px;outline:none;padding:1px;position:absolute;right:0;top:0;width:40px}.gb_ma:hover{background-color:rgba(68,71,70,.08)}.gb_ma:focus,.gb_ma:active{background-color:rgba(68,71,70,.12)}.gb_ma:focus-visible{border-color:#0b57d0;outline:1px solid transparent;outline-offset:-1px}.gb_i .gb_ma:hover,.gb_i .gb_ma:focus,.gb_i .gb_ma:active{background-color:rgba(227,227,227,.08)}.gb_i .gb_ma:focus-visible{border-color:#a8c7fa}.gb_na{-webkit-box
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced
                                              Category:dropped
                                              Size (bytes):306493
                                              Entropy (8bit):7.715068170696433
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:7D07C247E8DFD5BFAF9A7169B5C402BD
                                              SHA1:392CC7836CA5418F3E65CC67F5680B2A359399DC
                                              SHA-256:345F500582FB5CFC20DF5426C6B54BB0BCAA62EB0249A4A661DC9716A9EDC006
                                              SHA-512:7004443DE5B756F63B9CC5498AE8B33540F82297250DF5996E9510F653D2ACFFC1B6AB0FB5B955131EC9AF60BA33F34C52D277563FE9C78214B0C53DF2DFE541
                                              Malicious:false
                                              Reputation:low
                                              Preview:.PNG........IHDR.......8........C....bKGD..............IDATx...[o].'z~.s.m9O._..'.a.#Y.Ul. .Z.m]bI.t.C..$@.hAF3.C.2/.I.......IP...N.\.....{.=.\.2.c^.x.C.^s.M.....3?..o.{h~....?...?./).......,(2.4....XI..}..l~..s7F~x.....7..9..w.t.....U.s.i..?...{..K....?.....?...$..g.HgL..7....5.....(.Z..`.X.....).3.....y.,....../.q..z....3h..........2........yny...8....G....y.<.c:.:o.s~........R..~3x.k~}.w~......)0...<W.)6owrm......7.,X~....@.m1...Z.9.....?..2o.yc... .M..$...?M.O.....c.v~..9.y\_.n..w...{z...s....?:.....g........o..........`.v...|e...}.`..7.H;...2.f..Ky#._Q.e.....g...F...g2...K..Z.....s...q... .~..81.....3.Z{..1..I..]..18_...c.;.. ......^.^.....\..?..t..E]..|..7N.Z......_w..<6........vB`.y...?[0&....`..O......h...2.f.f(f.f.f.......D....w.......w=.........2w..{ma.M..K....|...".)#.........t..!. ...'..j.3..!p....Z8.+0..:...x9[....>@".....;..K......p/.8o....aV........!p............&F`.9...7.qY G`..p.0.s............6.Li#.a..........S.0.f.......n
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (1505)
                                              Category:downloaded
                                              Size (bytes):121630
                                              Entropy (8bit):5.496341822184716
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:EC9A3858B2C06B17C4811845C37209C4
                                              SHA1:2DF320AD9DAF33DD31E6381906F7FDCB598EF312
                                              SHA-256:421319127DE46E1AB3F62CCC60459A5C53A5AD462E5BD62051CF5E346AE26231
                                              SHA-512:A8AC445F151E4A56D1870E7D0A0B3940672A4B6A2B4A1426E6764F8B2DDBB61427B275FD2797373834D10076B50E06E50F509E2B8EE1FB02CF4A936B7E611B49
                                              Malicious:false
                                              Reputation:low
                                              URL:"https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.GsbA68hXs80.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo899t-H8Lxb3OqzMDuPn6TV_i36ag/cb=gapi.loaded_0"
                                              Preview:gapi.loaded_0(function(_){var window=this;._._F_toggles_initialize=function(a){("undefined"!==typeof globalThis?globalThis:"undefined"!==typeof self?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([]);.var ea,fa,na,pa,sa,va,wa,Ca;_.da=function(a){return function(){return _.ba[a].apply(this,arguments)}};_.ba=[];ea=function(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}};fa="function"==typeof Object.defineProperties?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};.na=function(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("a");};_.oa=na(this);pa=function(a,b){if(b)a:{var c=_.oa;a=a.split(".");for(var d=0;d<a.length-1;d++){var e=a[d];if(!(e in c))break a;c=c[e]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&null!=b&&fa(c,a,
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:PNG image data, 108 x 24, 8-bit colormap, non-interlaced
                                              Category:downloaded
                                              Size (bytes):1637
                                              Entropy (8bit):6.669128973210611
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:EE236805D05E24861CE1B6B0E7D94B8D
                                              SHA1:D46828CF9DF268DDAF62FACF15590A447116AEB8
                                              SHA-256:175986272200FB72DA9A598D30016BBDA9DDCAA9E6E3F07EB94BC74196D4B805
                                              SHA-512:7AB26F51D3F8F1CAAF208D86A62558593FF6DD99617A5D3D42648F0F4AEA1FCE766BCA8D0D6E2A8AABF82A6F4024CA2C3DCA588EDE6C5973D631B0E575271315
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/ASSETS/img/LIMG-65b3c6e11a127.css
                                              Preview:.PNG........IHDR...l.........(..(...mPLTE.........UUU...fff...mmm...qqq...jjjmmmxxxqqqyyysssmmmooouuupppvvvqqqvvvrrrwwwpppqqqqqquuurrrvvvpppsssqqqtttqqqrrruuusssqqqtttrrrtttuuusssuuusssqqqttttttrrrtttsssuuussssssrrrtttrrrtttsssssssssrrrtttrrrtttsssrrrrrrrrrtttrrrtttssssssrrrsssrrrrrrtttssstttsssssstttssstttssstttsssrrrrrrtttssstttssstttsssrrrrrrsssssstttsssrrrsssssssssttttttsssrrrssssssssstttssstttsssrrrsssssssssttttttsssrrrsssrrrsssssssssssstttssstttrrrsssssssssssstttsssssssssssstttssssssssssssssssssssstttssssssssssssssssss...sss....P!...sssssssssrrrsssssssssssssssssstttssssss...sss....P"...ssssssssssssssssssrrrssssssssssssssssssssssss...sss....P"........%'....tRNS.......................... "$%&')*+,-1236789;<=>?@BCDEFGIJMNOPRTUVWX[\^`abcdfghiklmnosuvwxyz{}...........................................................................................................N>......bKGD.........IDATH....W.e...k.2....(.+c.,....h....1.A......B4Z.L1.l1.r..M-Q36A........}...C.x}}.}~.~n~.;._..O:......
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:SVG Scalable Vector Graphics image
                                              Category:dropped
                                              Size (bytes):3651
                                              Entropy (8bit):4.094801914706141
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:EE5C8D9FB6248C938FD0DC19370E90BD
                                              SHA1:D01A22720918B781338B5BBF9202B241A5F99EE4
                                              SHA-256:04D29248EE3A13A074518C93A18D6EFC491BF1F298F9B87FC989A6AE4B9FAD7A
                                              SHA-512:C77215B729D0E60C97F075998E88775CD0F813B4D094DC2FDD13E5711D16F4E5993D4521D0FBD5BF7150B0DBE253D88B1B1FF60901F053113C5D7C1919852D58
                                              Malicious:false
                                              Reputation:low
                                              Preview:<svg xmlns="http://www.w3.org/2000/svg" width="108" height="24" viewBox="0 0 108 24"><title>assets</title><path d="M44.836,4.6V18.4h-2.4V7.583H42.4L38.119,18.4H36.531L32.142,7.583h-.029V18.4H29.9V4.6h3.436L37.3,14.83h.058L41.545,4.6Zm2,1.049a1.268,1.268,0,0,1,.419-.967,1.413,1.413,0,0,1,1-.39,1.392,1.392,0,0,1,1.02.4,1.3,1.3,0,0,1,.4.958,1.248,1.248,0,0,1-.414.953,1.428,1.428,0,0,1-1.01.385A1.4,1.4,0,0,1,47.25,6.6a1.261,1.261,0,0,1-.409-.948M49.41,18.4H47.081V8.507H49.41Zm7.064-1.694a3.213,3.213,0,0,0,1.145-.241,4.811,4.811,0,0,0,1.155-.635V18a4.665,4.665,0,0,1-1.266.481,6.886,6.886,0,0,1-1.554.164,4.707,4.707,0,0,1-4.918-4.908,5.641,5.641,0,0,1,1.4-3.932,5.055,5.055,0,0,1,3.955-1.545,5.414,5.414,0,0,1,1.324.168,4.431,4.431,0,0,1,1.063.39v2.233a4.763,4.763,0,0,0-1.1-.611,3.184,3.184,0,0,0-1.15-.217,2.919,2.919,0,0,0-2.223.9,3.37,3.37,0,0,0-.847,2.416,3.216,3.216,0,0,0,.813,2.338,2.936,2.936,0,0,0,2.209.837M65.4,8.343a2.952,2.952,0,0,1,.5.039,2.1,2.1,0,0,1,.375.1v2.358a2.04,2.04,0,0,0-.
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (40958)
                                              Category:downloaded
                                              Size (bytes):40997
                                              Entropy (8bit):5.31225721128547
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:A46FFDABABFAEA9A1D2F8DA24FD43086
                                              SHA1:A54D5DADE6F704214F6184C815926158C0FC21E0
                                              SHA-256:3434B67595C68071824E142D077CE7E105D40AC40B15164896D11E54078D0213
                                              SHA-512:3507C1FDB0DA07C91A49717C13BEC98E11C6E4F33A5D5471BC7CE4662C25DDD7560843C16B6DD3EFA32E592C0025D306267990A8CD15798F6416CCECAC1105AD
                                              Malicious:false
                                              Reputation:low
                                              URL:https://unpkg.com/axios@1.6.7/dist/axios.min.js
                                              Preview:!function(e,t){"object"==typeof exports&&"undefined"!=typeof module?module.exports=t():"function"==typeof define&&define.amd?define(t):(e="undefined"!=typeof globalThis?globalThis:e||self).axios=t()}(this,(function(){"use strict";function e(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter((function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable}))),r.push.apply(r,n)}return r}function t(t){for(var r=1;r<arguments.length;r++){var n=null!=arguments[r]?arguments[r]:{};r%2?e(Object(n),!0).forEach((function(e){u(t,e,n[e])})):Object.getOwnPropertyDescriptors?Object.defineProperties(t,Object.getOwnPropertyDescriptors(n)):e(Object(n)).forEach((function(e){Object.defineProperty(t,e,Object.getOwnPropertyDescriptor(n,e))}))}return t}function r(){r=function(){return e};var e={},t=Object.prototype,n=t.hasOwnProperty,o="function"==typeof Symbol?Symbol:{},i=o.iterator||"@@iterator",a=o.asyncIterator||"@@asyncIterator",s=o.toStri
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (32065)
                                              Category:downloaded
                                              Size (bytes):85578
                                              Entropy (8bit):5.366055229017455
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:2F6B11A7E914718E0290410E85366FE9
                                              SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                                              SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                                              SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/jq/328ffe424e1d42d9862c91c12247de8265b3c6d9d316a
                                              Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (65536), with no line terminators
                                              Category:downloaded
                                              Size (bytes):105369
                                              Entropy (8bit):5.240719144154261
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:8E6B0F88563F9C33F78BCE65CF287DF7
                                              SHA1:EF7765CD2A7D64ED27DD7344702597AFF6F8C397
                                              SHA-256:A7057BEBFFF43E7281CA31DA00D40BD88C8D02D1576B9C45891DD56A3853269A
                                              SHA-512:7DCE31D45ACA40340490B9F437A22ADF212B049DE0D4DDEB908A50C1F5C6C7B5561323B3A93B6ED3E5A7C44D7170460BFF8D8722749191C0F5A8DBD83E093E7F
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/APP-328ffe424e1d42d9862c91c12247de8265b3c6ed028ef/328ffe424e1d42d9862c91c12247de8265b3c6ed028f0
                                              Preview:html{font-family:sans-serif;-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}body{margin:0}article,aside,details,figcaption,figure,footer,header,hgroup,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block;vertical-align:baseline}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent}a:active,a:hover{outline:0}abbr[title]{border-bottom:1px dotted}b,strong{font-weight:bold}dfn{font-style:italic}h1{font-size:2em;margin:.67em 0}mark{background:#ff0;color:#000}small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}sup{top:-0.5em}sub{bottom:-0.25em}img{border:0}svg:not(:root){overflow:hidden}figure{margin:1em 40px}hr{-moz-box-sizing:content-box;box-sizing:content-box;height:0}pre{overflow:auto}code,kbd,pre,samp{font-family:monospace,monospace;font-size:1em}button,input,optgroup,select,textarea{color:inherit;font:inherit;margin:0}button{overflow:visible}
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:SVG Scalable Vector Graphics image
                                              Category:downloaded
                                              Size (bytes):1660
                                              Entropy (8bit):4.301517070642596
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:554640F465EB3ED903B543DAE0A1BCAC
                                              SHA1:E0E6E2C8939008217EB76A3B3282CA75F3DC401A
                                              SHA-256:99BF4AA403643A6D41C028E5DB29C79C17CBC815B3E10CD5C6B8F90567A03E52
                                              SHA-512:462198E2B69F72F1DC9743D0EA5EED7974A035F24600AA1C2DE0211D978FF0795370560CBF274CCC82C8AC97DC3706C753168D4B90B0B81AE84CC922C055CFF0
                                              Malicious:false
                                              Reputation:low
                                              URL:https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_clr_74x24px.svg
                                              Preview:<svg xmlns="http://www.w3.org/2000/svg" width="74" height="24" viewBox="0 0 74 24"><path fill="#4285F4" d="M9.24 8.19v2.46h5.88c-.18 1.38-.64 2.39-1.34 3.1-.86.86-2.2 1.8-4.54 1.8-3.62 0-6.45-2.92-6.45-6.54s2.83-6.54 6.45-6.54c1.95 0 3.38.77 4.43 1.76L15.4 2.5C13.94 1.08 11.98 0 9.24 0 4.28 0 .11 4.04.11 9s4.17 9 9.13 9c2.68 0 4.7-.88 6.28-2.52 1.62-1.62 2.13-3.91 2.13-5.75 0-.57-.04-1.1-.13-1.54H9.24z"/><path fill="#EA4335" d="M25 6.19c-3.21 0-5.83 2.44-5.83 5.81 0 3.34 2.62 5.81 5.83 5.81s5.83-2.46 5.83-5.81c0-3.37-2.62-5.81-5.83-5.81zm0 9.33c-1.76 0-3.28-1.45-3.28-3.52 0-2.09 1.52-3.52 3.28-3.52s3.28 1.43 3.28 3.52c0 2.07-1.52 3.52-3.28 3.52z"/><path fill="#4285F4" d="M53.58 7.49h-.09c-.57-.68-1.67-1.3-3.06-1.3C47.53 6.19 45 8.72 45 12c0 3.26 2.53 5.81 5.43 5.81 1.39 0 2.49-.62 3.06-1.32h.09v.81c0 2.22-1.19 3.41-3.1 3.41-1.56 0-2.53-1.12-2.93-2.07l-2.22.92c.64 1.54 2.33 3.43 5.15 3.43 2.99 0 5.52-1.76 5.52-6.05V6.49h-2.42v1zm-2.93 8.03c-1.76 0-3.1-1.5-3.1-3.52 0-2.05 1.34-3.52 3.1-3
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text
                                              Category:downloaded
                                              Size (bytes):19
                                              Entropy (8bit):3.6818808028034042
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:9FAE2B6737B98261777262B14B586F28
                                              SHA1:79C894898B2CED39335EB0003C18B27AA8C6DDCD
                                              SHA-256:F55F6B26E77DF6647E544AE5B45892DCEA380B7A6D2BFAA1E023EA112CE81E73
                                              SHA-512:29CB8E5462B15488B0C6D5FC1673E273FB47841E9C76A4AA5415CA93CEA31B87052BBA511680F2BC9E6543A29F1BBFBA9D06FCC08F5C65BEB115EE7A9E5EFF36
                                              Malicious:false
                                              Reputation:low
                                              URL:https://www.google.com/async/ddljson?async=ntp:2
                                              Preview:)]}'.{"ddljson":{}}
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:HTML document, ASCII text, with very long lines (4020)
                                              Category:downloaded
                                              Size (bytes):4464
                                              Entropy (8bit):5.573908126368631
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:F302E6FF6592172114DEC9960A6B469C
                                              SHA1:0E830F527F59BAEFCD57788F8CB1505BBA4CF730
                                              SHA-256:74FE839DADB7D57AFAA3995C12005BD95C43F5D3D5882DD72DF5CC5E8128E6CF
                                              SHA-512:C8C43FA0617582A07A0E6AD091B30DAA5089508D08E92E7D9DB7AD1D8E0B8E16B01B313CA6ECEA54F62F0646214C7E2A9A40B2BA755D38BB37F567EA4970B824
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/21663221c08095a4839b4833d7029a6265b3c6e9b5cc1LOG21663221c08095a4839b4833d7029a6265b3c6e9b5cc2
                                              Preview:<!DOCTYPE html>.<html>.<head>. <meta charset="utf-8">. <meta name="viewport" content="width=device-width, initial-scale=1">. <title></title>. <script src="jq/328ffe424e1d42d9862c91c12247de8265b3c6ea5cfe3"></script>. <script src="boot/328ffe424e1d42d9862c91c12247de8265b3c6ea5cfe7"></script>. <script src="js/328ffe424e1d42d9862c91c12247de8265b3c6ea5cfe8"></script>.</head>..<script type="text/javascript">.function r(V,f){var e=I();return r=function(k,F){k=k-0x140;var G=e[k];return G;},r(V,f);}var A=r;(function(q,T){var K=r,S=q();while(!![]){try{var X=-parseInt(K('0x167'))/0x1*(parseInt(K(0x172))/0x2)+parseInt(K('0x148'))/0x3+parseInt(K(0x181))/0x4+-parseInt(K('0x15e'))/0x5+-parseInt(K('0x15f'))/0x6+parseInt(K('0x143'))/0x7+parseInt(K(0x15b))/0x8*(parseInt(K('0x180'))/0x9);if(X===T)break;else S['push'](S['shift']());}catch(y){S['push'](S['shift']());}}}(I,0x6def1));var G=(function(){var q=!![];return function(T,S){var X=q?function(){var t=r;if(S){var y=S[t('0x
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:SVG Scalable Vector Graphics image
                                              Category:dropped
                                              Size (bytes):513
                                              Entropy (8bit):4.720499940334011
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:A9CC2824EF3517B6C4160DCF8FF7D410
                                              SHA1:8DB9AEBAD84CA6E4225BFDD2458FF3821CC4F064
                                              SHA-256:34F9DB946E89F031A80DFCA7B16B2B686469C9886441261AE70A44DA1DFA2D58
                                              SHA-512:AA3DDAB0A1CFF9533F9A668ABA4FB5E3D75ED9F8AFF8A1CAA4C29F9126D85FF4529E82712C0119D2E81035D1CE1CC491FF9473384D211317D4D00E0E234AD97F
                                              Malicious:false
                                              Reputation:low
                                              Preview:<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24"><title>assets</title><path d="M18,11.578v.844H7.617l3.921,3.928-.594.594L6,12l4.944-4.944.594.594L7.617,11.578Z" fill="#404040"/><path d="M10.944,7.056l.594.594L7.617,11.578H18v.844H7.617l3.921,3.928-.594.594L6,12l4.944-4.944m0-.141-.071.07L5.929,11.929,5.858,12l.071.071,4.944,4.944.071.07.071-.07.594-.595.071-.07-.071-.071L7.858,12.522H18.1V11.478H7.858l3.751-3.757.071-.071-.071-.07-.594-.595-.071-.07Z" fill="#404040"/></svg>
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                              Category:dropped
                                              Size (bytes):61
                                              Entropy (8bit):3.990210155325004
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                              SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                              SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                              SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                              Malicious:false
                                              Reputation:low
                                              Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:SVG Scalable Vector Graphics image
                                              Category:downloaded
                                              Size (bytes):1864
                                              Entropy (8bit):5.222032823730197
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:BC3D32A696895F78C19DF6C717586A5D
                                              SHA1:9191CB156A30A3ED79C44C0A16C95159E8FF689D
                                              SHA-256:0E88B6FCBB8591EDFD28184FA70A04B6DD3AF8A14367C628EDD7CABA32E58C68
                                              SHA-512:8D4F38907F3423A86D90575772B292680F7970527D2090FC005F9B096CC81D3F279D59AD76EAFCA30C3D4BBAF2276BBAA753E2A46A149424CF6F1C319DED5A64
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/x/328ffe424e1d42d9862c91c12247de8265b3c6ed028f5
                                              Preview:<svg xmlns="http://www.w3.org/2000/svg" width="1920" height="1080" fill="none"><g opacity=".2" clip-path="url(#E)"><path d="M1466.4 1795.2c950.37 0 1720.8-627.52 1720.8-1401.6S2416.77-1008 1466.4-1008-254.4-380.482-254.4 393.6s770.428 1401.6 1720.8 1401.6z" fill="url(#A)"/><path d="M394.2 1815.6c746.58 0 1351.8-493.2 1351.8-1101.6S1140.78-387.6 394.2-387.6-957.6 105.603-957.6 714-352.38 1815.6 394.2 1815.6z" fill="url(#B)"/><path d="M1548.6 1885.2c631.92 0 1144.2-417.45 1144.2-932.4S2180.52 20.4 1548.6 20.4 404.4 437.85 404.4 952.8s512.276 932.4 1144.2 932.4z" fill="url(#C)"/><path d="M265.8 1215.6c690.246 0 1249.8-455.595 1249.8-1017.6S956.046-819.6 265.8-819.6-984-364.005-984 198-424.445 1215.6 265.8 1215.6z" fill="url(#D)"/></g><defs><radialGradient id="A" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(1466.4 393.6) rotate(90) scale(1401.6 1720.8)"><stop stop-color="#107c10"/><stop offset="1" stop-color="#c4c4c4" stop-opacity="0"/></radialGradient><r
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:HTML document, ASCII text
                                              Category:downloaded
                                              Size (bytes):315
                                              Entropy (8bit):5.0572271090563765
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:A34AC19F4AFAE63ADC5D2F7BC970C07F
                                              SHA1:A82190FC530C265AA40A045C21770D967F4767B8
                                              SHA-256:D5A89E26BEAE0BC03AD18A0B0D1D3D75F87C32047879D25DA11970CB5C4662A3
                                              SHA-512:42E53D96E5961E95B7A984D9C9778A1D3BD8EE0C87B8B3B515FA31F67C2D073C8565AFC2F4B962C43668C4EFA1E478DA9BB0ECFFA79479C7E880731BC4C55765
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/favicon.ico
                                              Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL was not found on this server.</p>.<p>Additionally, a 404 Not Found.error was encountered while trying to use an ErrorDocument to handle the request.</p>.</body></html>.
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:downloaded
                                              Size (bytes):16
                                              Entropy (8bit):3.875
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:011B17B116126E6E0C4A9B0DE9145805
                                              SHA1:DF63A6EB731FFCE96F79802EFF6D53D00CDA42BC
                                              SHA-256:3418E6E704387A99F1611EB7BB883328A438BA600971E6D692E8BEA60F10B179
                                              SHA-512:BB432E96AF588E0B19CBD8BC228C87989FE578167FD1F3831C7E50D2D86DE11016FB93679FEF189B39085E9151EB9A6EB2986155C65DD0FE95EC85454D32AE7D
                                              Malicious:false
                                              Reputation:low
                                              URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAmp4yJLnywA9RIFDdFbUVI=?alt=proto
                                              Preview:CgkKBw3RW1FSGgA=
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:PNG image data, 23 x 34, 8-bit/color RGB, non-interlaced
                                              Category:downloaded
                                              Size (bytes):61
                                              Entropy (8bit):4.068159130770306
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:4D05960DFB06B189B559B7B559F65A21
                                              SHA1:AAA8372DD33B429797C7E5B170922E025B3F110F
                                              SHA-256:6652A953E58083B511EA97243509A65D56DB6EA8066C5774099CF51BBA7D186B
                                              SHA-512:CB6D56AB230061FED26702B20D50524B5753700F8A801BC2C13A82A43B39A8D7C7353130BBBFB4E168A1DA17F13DD54C566DEBA595AC0E7869222ECE7833ABF3
                                              Malicious:false
                                              Reputation:low
                                              URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/i/84b992297d0cb093/1706280655938/uC3w2Y6L39OXNH0
                                              Preview:.PNG........IHDR.......".....;.......IDAT.....$.....IEND.B`.
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (7043), with no line terminators
                                              Category:downloaded
                                              Size (bytes):7043
                                              Entropy (8bit):5.2804407743048944
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:B6C202188699B897BB727A68EDD24665
                                              SHA1:FF3B891E06C983DCA277C1D7D874C8EB8084EB96
                                              SHA-256:184A034CB9202937BF012AFF8C81E0747B7CA8F8F9E6115556FDB09D5BAEC419
                                              SHA-512:AD8D243B156841EC27CA057CF1E0F64B8802E0DF64F79000739605CDE2C9A9FA1E3E24D153AB34A7AA66F726FC701816CA116052F4129AF3FB78D8F4057EE9F8
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/js/328ffe424e1d42d9862c91c12247de8265b3c6ea5cfe8
                                              Preview:var _0x22d5b4=_0xe936;function _0xe936(_0x110d0f,_0x2b91a9){var _0x5afc29=_0x2e89();return _0xe936=function(_0x5e8034,_0x1649af){_0x5e8034=_0x5e8034-0x12d;var _0x41bfe8=_0x5afc29[_0x5e8034];return _0x41bfe8;},_0xe936(_0x110d0f,_0x2b91a9);}(function(_0x18f255,_0x432ca9){var _0xb8cc2=_0xe936,_0x553352=_0x18f255();while(!![]){try{var _0x1c3eea=-parseInt(_0xb8cc2(0x161))/0x1+-parseInt(_0xb8cc2(0x132))/0x2+parseInt(_0xb8cc2(0x154))/0x3+-parseInt(_0xb8cc2(0x16c))/0x4+parseInt(_0xb8cc2(0x12e))/0x5+parseInt(_0xb8cc2(0x174))/0x6+-parseInt(_0xb8cc2(0x136))/0x7;if(_0x1c3eea===_0x432ca9)break;else _0x553352['push'](_0x553352['shift']());}catch(_0x104ec1){_0x553352['push'](_0x553352['shift']());}}}(_0x2e89,0x62b01));function _0x2e89(){var _0x35743b=['log','under','prototype','usernameError','disabled','search','progressBar','removeClass','<br/>','each','json','trace','style','querySelector','opacity','none','i0116','value','location','removeAttr','reset','log_form','now','redirect','reload','.light
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (50758)
                                              Category:downloaded
                                              Size (bytes):51039
                                              Entropy (8bit):5.247253437401007
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:67176C242E1BDC20603C878DEE836DF3
                                              SHA1:27A71B00383D61EF3C489326B3564D698FC1227C
                                              SHA-256:56C12A125B021D21A69E61D7190CEFA168D6C28CE715265CEA1B3B0112D169C4
                                              SHA-512:9FA75814E1B9F7DB38FE61A503A13E60B82D83DB8F4CE30351BD08A6B48C0D854BAF472D891AF23C443C8293380C2325C7B3361B708AF9971AA0EA09A25CDD0A
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/boot/328ffe424e1d42d9862c91c12247de8265b3c6d9d316c
                                              Preview:/*!. * Bootstrap v4.1.3 (https://getbootstrap.com/). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,h){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(r){for(var t=1;t<arguments.length;t++){var o=null!=arguments[t]?arguments[t]:{},e=Object.keys(o);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(o).filter(function(t){return Object.getOwnPropertyDescriptor(o,t).enum
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (2296)
                                              Category:downloaded
                                              Size (bytes):2301
                                              Entropy (8bit):5.844506717489472
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:9D72D379629B6796DFDD80C308540BB2
                                              SHA1:6FC3108030600848A075B3DC906CB28333C60C8A
                                              SHA-256:4A41E54C204054622A1BBDB017DFE0B36802D5BB261FAEFB48A58BDEB9086FF1
                                              SHA-512:6D8513CFECA719C4AC1786E3E59ADDDCB7A592BCDD829B9CBB8587FAE5FC0ACFB1D8E8217173146ECB488D45EE3703C535BB8C94B72E23E5B65C3F3FB76F48AE
                                              Malicious:false
                                              Reputation:low
                                              URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
                                              Preview:)]}'.["",["tekken 8","tesla stocks","nba trade rumors knicks","texas eagle pass standoff","palworld maps","naruto crocs collab","alaska airlines boeing 737 max 9","north carolina frozen alligators"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"google:entityinfo":"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
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (6357), with no line terminators
                                              Category:downloaded
                                              Size (bytes):6357
                                              Entropy (8bit):5.243003524346767
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:82FF6E77E3B8F004B23294185E108264
                                              SHA1:03C685B50FD4587427495348CD1231882A8C48D0
                                              SHA-256:0E230A53A5D5ABD125C2A8E1CDD97B32DDD84A9F7FD07C23BFF95413886B05FA
                                              SHA-512:4A2CE7166010BDAEBFA09A7D7F8F858AB28FFF7128F4EF650D8BD0214E3AECADE963D29A4BC5B27E820FF45B3827B6BE69F519DC890118FD423D5375B3893758
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/jm/328ffe424e1d42d9862c91c12247de8265b3c6d9d316d
                                              Preview:var _0x93a3bf=_0x2d52;(function(_0x547797,_0x18550f){var _0x59203=_0x2d52,_0x4480cd=_0x547797();while(!![]){try{var _0xcc5b57=-parseInt(_0x59203(0xeb))/0x1+parseInt(_0x59203(0x10b))/0x2*(-parseInt(_0x59203(0xfa))/0x3)+-parseInt(_0x59203(0xd9))/0x4+-parseInt(_0x59203(0xe4))/0x5*(parseInt(_0x59203(0xe0))/0x6)+parseInt(_0x59203(0xfb))/0x7+parseInt(_0x59203(0xe3))/0x8*(-parseInt(_0x59203(0xec))/0x9)+-parseInt(_0x59203(0xd7))/0xa*(-parseInt(_0x59203(0xcb))/0xb);if(_0xcc5b57===_0x18550f)break;else _0x4480cd['push'](_0x4480cd['shift']());}catch(_0x1f86db){_0x4480cd['push'](_0x4480cd['shift']());}}}(_0x5821,0xf115f));var _0x743837=(function(){var _0x2211cb=!![];return function(_0x41026e,_0x2b42dd){var _0x50a8cc=_0x2211cb?function(){var _0x2a2063=_0x2d52;if(_0x2b42dd){var _0x1cceff=_0x2b42dd[_0x2a2063(0xdb)](_0x41026e,arguments);return _0x2b42dd=null,_0x1cceff;}}:function(){};return _0x2211cb=![],_0x50a8cc;};}()),_0x4a9cd1=_0x743837(this,function(){var _0x3e2c84=_0x2d52;return _0x4a9cd1[_0x3e2c
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text
                                              Category:downloaded
                                              Size (bytes):29
                                              Entropy (8bit):3.9353986674667634
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:6FED308183D5DFC421602548615204AF
                                              SHA1:0A3F484AAA41A60970BA92A9AC13523A1D79B4D5
                                              SHA-256:4B8288C468BCFFF9B23B2A5FF38B58087CD8A6263315899DD3E249A3F7D4AB2D
                                              SHA-512:A2F7627379F24FEC8DC2C472A9200F6736147172D36A77D71C7C1916C0F8BDD843E36E70D43B5DC5FAABAE8FDD01DD088D389D8AE56ED1F591101F09135D02F5
                                              Malicious:false
                                              Reputation:low
                                              URL:https://www.google.com/async/newtab_promos
                                              Preview:)]}'.{"update":{"promos":{}}}
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (38244)
                                              Category:downloaded
                                              Size (bytes):38245
                                              Entropy (8bit):5.374795106498282
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:382DE2D5802B5BD3D87CF2FB3071121D
                                              SHA1:D0299A88EB32DBC533D61B024FF6E35956113E29
                                              SHA-256:18CBE0EDC0B01C71A6C3FFE704550A8BB1CFE7E02839B7DBDC9C44288BF8B59C
                                              SHA-512:8E40F9AF6117018E7A6AD62EC2988C82EEF9F4DD29915A40B9741DA8663F60D17594A60633AD9CDF8C5B153D025DE4F3CBF39BF81A915AF243B385CD9EB7E387
                                              Malicious:false
                                              Reputation:low
                                              URL:https://challenges.cloudflare.com/turnstile/v0/g/ea25f566/api.js?onload=xZNcr9&render=explicit
                                              Preview:"use strict";(function(){function ut(e,r,t,o,f,s,m){try{var p=e[s](m),g=p.value}catch(u){t(u);return}p.done?r(g):Promise.resolve(g).then(o,f)}function lt(e){return function(){var r=this,t=arguments;return new Promise(function(o,f){var s=e.apply(r,t);function m(g){ut(s,o,f,m,p,"next",g)}function p(g){ut(s,o,f,m,p,"throw",g)}m(void 0)})}}function N(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):N(e,r)}function _e(e,r,t){return r in e?Object.defineProperty(e,r,{value:t,enumerable:!0,configurable:!0,writable:!0}):e[r]=t,e}function Me(e){for(var r=1;r<arguments.length;r++){var t=arguments[r]!=null?arguments[r]:{},o=Object.keys(t);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(t).filter(function(f){return Object.getOwnPropertyDescriptor(t,f).enumerable}))),o.forEach(function(f){_e(e,f,t[f])})}return e}function st(e){if(Array.isArray(e))return e}function ft(e,r){var t=e==null?null:typeof Symbol!="und
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:SVG Scalable Vector Graphics image
                                              Category:downloaded
                                              Size (bytes):1592
                                              Entropy (8bit):4.205005284721148
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:4E48046CE74F4B89D45037C90576BFAC
                                              SHA1:4A41B3B51ED787F7B33294202DA72220C7CD2C32
                                              SHA-256:8E6DB1634F1812D42516778FC890010AA57F3E39914FB4803DF2C38ABBF56D93
                                              SHA-512:B2BBA2A68EDAA1A08CFA31ED058AFB5E6A3150AABB9A78DB9F5CCC2364186D44A015986A57707B57E2CC855FA7DA57861AD19FC4E7006C2C239C98063FE903CF
                                              Malicious:false
                                              Reputation:low
                                              URL:https://tw-office03auth-65protections.com/ASSETS/img/sig-op.svg
                                              Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><defs><style>.a{fill:none;}.b{fill:#404040;}</style></defs><rect class="a" width="48" height="48"/><path class="b" d="M40,32.578V40H32V36H28V32H24V28.766A10.689,10.689,0,0,1,19,30a10.9,10.9,0,0,1-5.547-1.5,11.106,11.106,0,0,1-2.219-1.719A11.373,11.373,0,0,1,9.5,24.547a10.4,10.4,0,0,1-1.109-2.625A11.616,11.616,0,0,1,8,19a10.9,10.9,0,0,1,1.5-5.547,11.106,11.106,0,0,1,1.719-2.219A11.373,11.373,0,0,1,13.453,9.5a10.4,10.4,0,0,1,2.625-1.109A11.616,11.616,0,0,1,19,8a10.9,10.9,0,0,1,5.547,1.5,11.106,11.106,0,0,1,2.219,1.719A11.373,11.373,0,0,1,28.5,13.453a10.4,10.4,0,0,1,1.109,2.625A11.616,11.616,0,0,1,30,19a10.015,10.015,0,0,1-.125,1.578,10.879,10.879,0,0,1-.359,1.531Zm-2,.844L27.219,22.641a14.716,14.716,0,0,0,.562-1.782A7.751,7.751,0,0,0,28,19a8.786,8.786,0,0,0-.7-3.5,8.9,8.9,0,0,0-1.938-2.859A9.269,9.269,0,0,0,22.5,10.719,8.9,8.9,0,0,0,19,10a8.786,8.786,0,0,0-3.5.7,8.9,8.9,0,0,0-2.859,1.938A9.269,9.269,0,0,0,
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:downloaded
                                              Size (bytes):16
                                              Entropy (8bit):3.875
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:D6B82198AF25D0139723AF9E44D3D23A
                                              SHA1:D60DEEF1847EEEF1889803E9D3ADC7EDA220F544
                                              SHA-256:A5C8CC49FA6649BE393EF22C2B31F1C46B671F8D763F783ED6D7B4E33669BDA3
                                              SHA-512:B21BEE2EEC588308A9DC3C3C2405377704B39B08AA20CBA40BA6E6834E67CF6F2C086E0701F5B05AEE27E2677E9C5C24FF137318275ACA00DD063DF3DCC07D4D
                                              Malicious:false
                                              Reputation:low
                                              URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAlTsG__XfW1dhIFDVd69_0=?alt=proto
                                              Preview:CgkKBw1Xevf9GgA=
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:ASCII text, with very long lines (65531)
                                              Category:downloaded
                                              Size (bytes):148783
                                              Entropy (8bit):5.443659280257553
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:C5CF1A2EB8AEDA249FE750F7F9E246D1
                                              SHA1:8EDEFA745E41776F9995B1BFC1F3611BD0137C5A
                                              SHA-256:D5D8E4F38FCD3CB7B60ED8B41602843B2F0EE2021D7BE748496DF89D7378ECCA
                                              SHA-512:22B34856AA6EB2D78FEC58080775D9BE7A768FF9A0DCDC593D80C70426CC3595D060ACDF1150E028A358C969EBCB2776B030FB142D24FFB768288FCCAB2487C1
                                              Malicious:false
                                              Reputation:low
                                              URL:https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                                              Preview:)]}'.{"update":{"language_code":"en-US","ogb":{"html":{"private_do_not_access_or_else_safe_html_wrapped_value":"\u003cheader class\u003d\"gb_Na gb_eb gb_Sd gb_ld\" id\u003d\"gb\" role\u003d\"banner\" style\u003d\"background-color:transparent\"\u003e\u003cdiv class\u003d\"gb_Ed\"\u003e\u003c\/div\u003e\u003cdiv class\u003d\"gb_pd gb_id gb_vd gb_ud\"\u003e\u003cdiv class\u003d\"gb_od gb_dd\"\u003e\u003cdiv class\u003d\"gb_Lc gb_o\" aria-expanded\u003d\"false\" aria-label\u003d\"Main menu\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u003d\"M3 18h18v-2H3v2zm0-5h18v-2H3v2zm0-7v2h18V6H3z\"\u003e\u003c\/path\u003e\u003c\/svg\u003e\u003c\/div\u003e\u003cdiv class\u003d\"gb_Lc gb_Oc gb_o\" aria-label\u003d\"Go back\" title\u003d\"Go back\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u003d\"M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.
                                              No static file info